Fundamentals of Computer Networks (AQA GCSE Computer Science)

Exam Questions

55 mins11 questions
1a1 mark

PANs and LANs are two different types of network.

Describe one difference between a PAN and a LAN.

1b1 mark

Give one example of where a PAN could be used.

1c2 marks

When two computers on a network communicate with each other they need to use the same protocol.

Define the term network protocol.

1d2 marks

Identify one choice to indicate the most suitable protocol to use in the situation described.

Used to retrieve email stored on a server.

  • HTTP

  • HTTPS

  • FTP

  • SMTP

  • IMAP

1e1 mark

Used to make a payment securely when purchasing goods from a website.

  • HTTP

  • HTTPS

  • FTP

  • SMTP

  • IMAP

1f1 mark

Used to send an email from a client machine to an email server.

  • HTTP

  • HTTPS

  • FTP

  • SMTP

  • IMAP

Did this page help you?

2a2 marks

Identify two choices to show which statements are true about LANs.

  • LANs always use the Ethernet protocol.

  • LANs always use wireless technology.

  • LANs are usually controlled or owned by a single organisation

  • LANs connect a maximum of 150 devices.

  • LANs cover one room, building or site

2b2 marks

HTTP is an example of a network protocol.

Define the term network protocol.

Did this page help you?

3a1 mark

Computer networks can be installed using wired or wireless technology.

State one wireless method used to connect devices on a Personal Area Network (PAN).

3b1 mark

Identify one choice to indicate the application layer protocol used for sending emails from a client device to a mail server.

  • FTP

  • HTTP

  • SMTP

  • UDP

Did this page help you?

4a2 marks

Define the term computer network.

4b2 marks

Identify two choices that are correct statements about network protocols.

  • A protocol is a set of rules.

  • All protocols only work with specific hardware.

  • All protocols transmit data secure

  • Ethernet is a family of protocols.

  • Wi-Fi is a single protocol.

Did this page help you?

1a2 marks

Most schools have a computer network.

Some schools allow teachers to access the school network from their home computers.

Give one reason why some schools allow this and one reason why some schools do not allow this.

1b3 marks

State three advantages of using a computer network.

1c3 marks

TCP/IP is a protocol used in networking. There are 4 layers in the TCP/IP stack.

Complete the table by placing the four layers of the TCP/IP stack into order (1-4) where 1 is the top layer and 4 is the bottom layer.

Layer

Order (1-4)

Transport

Link

Internet

Application

Did this page help you?

2a2 marks

Describe two differences between a PAN and a WAN.

2b2 marks

State two differences between a bus topology and a star topology.

2c2 marks

The application layer and the transport layer are two of the layers within the TCP/IP model.

What are the names of the other two layers of the TCP/IP model?

Did this page help you?

3a1 mark

Describe two differences between a Local Area Network (LAN) and a Wide Area Network (WAN).

3b3 marks

Give three advantages of using a wireless network instead of a wired network.

3c2 marks

Explain the purpose of the HTTPS protocol.

Did this page help you?

4a2 marks

Explain how a firewall can be used to improve the security of a computer network.

4b2 marks

Authentication and MAC address filtering can be used to improve network security.

Explain how one of these security methods works.

Did this page help you?

52 marks

Explain one data privacy concern an organisation would need to consider when setting up a wireless network.

Did this page help you?

12 marks

Explain why it would not be appropriate for the café to use MAC address filtering on their wireless network.

Did this page help you?

29 marks

Table 4 shows three layers of the TCP/IP model and some protocols that operate at each of these layers.

Table 4

Layer

Protocol

Application layer

HTTP
HTTPS
SMTP
IMAP
FTP

Transport layer

TCP
UDP

Internet layer

IP

Describe the role of one protocol from each layer in Table 4.

You must state which protocol you are describing.

Did this page help you?